Skip to content

Commit

Permalink
Merge pull request #27 from lorengordon/depends
Browse files Browse the repository at this point in the history
Establishes dependency link between newer config rules and the config recorder
  • Loading branch information
lorengordon authored Oct 28, 2019
2 parents 7d5daad + c13fcf9 commit 414d5e7
Show file tree
Hide file tree
Showing 3 changed files with 5 additions and 5 deletions.
2 changes: 1 addition & 1 deletion .bumpversion.cfg
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
[bumpversion]
current_version = 1.0.2
current_version = 1.0.3
commit = True
message = Bumps version to {new_version}
tag = False
Expand Down
2 changes: 1 addition & 1 deletion Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -105,7 +105,7 @@ tfdocs-awk/install: ARCHIVE := https://github.com/plus3it/tfdocs-awk/archive/mas
tfdocs-awk/install:
$(CURL) $(ARCHIVE) | tar -C $(BIN_DIR) --strip-components=1 --wildcards '*.sh' --wildcards '*.awk' -xzvf -

docs/%: README_PARTS := _docs/MAIN.md <(echo) <($(BIN_DIR)/terraform-docs.sh markdown table .)
docs/%: README_PARTS := _docs/MAIN.md <(echo) <($(BIN_DIR)/terraform-docs.sh markdown .)
docs/%: README_FILE ?= README.md

docs/lint: | guard/program/terraform-docs tfdocs-awk/install
Expand Down
6 changes: 3 additions & 3 deletions main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -567,7 +567,7 @@ resource "aws_config_config_rule" "restricted_common_ports_access" {
count = var.create_config_rules && ! local.exclude_restricted_common_ports_access ? 1 : 0

name = "restricted-common-ports-access"
description = "Checks whether security groups that are in use disallow unrestricted incoming TCP traffic to the specified ports."
description = "Checks whether security groups that are in use disallow unrestricted incoming TCP traffic to the specified ports. Config recorder: ${var.config_recorder}"

input_parameters = <<-EOF
{
Expand All @@ -591,7 +591,7 @@ resource "aws_config_config_rule" "restricted_common_ports_database" {
count = var.create_config_rules && ! local.exclude_restricted_common_ports_database ? 1 : 0

name = "restricted-common-ports-database"
description = "Checks whether security groups that are in use disallow unrestricted incoming TCP traffic to the specified ports."
description = "Checks whether security groups that are in use disallow unrestricted incoming TCP traffic to the specified ports. Config recorder: ${var.config_recorder}"

input_parameters = <<-EOF
{
Expand All @@ -618,7 +618,7 @@ resource "aws_config_config_rule" "ebs_snapshot_public_restorable_check" {
count = var.create_config_rules && ! local.exclude_ebs_snapshot_public_restorable_check ? 1 : 0

name = "ebs-snapshot-public-restorable-check"
description = "Checks whether Amazon Elastic Block Store (Amazon EBS) snapshots are not publicly restorable. The rule is NON_COMPLIANT if one or more snapshots with RestorableByUserIds field are set to all, that is, Amazon EBS snapshots are public."
description = "Checks whether Amazon Elastic Block Store (Amazon EBS) snapshots are not publicly restorable. The rule is NON_COMPLIANT if one or more snapshots with RestorableByUserIds field are set to all, that is, Amazon EBS snapshots are public. Config recorder: ${var.config_recorder}"
input_parameters = "{}"
maximum_execution_frequency = "TwentyFour_Hours"

Expand Down

0 comments on commit 414d5e7

Please sign in to comment.